Protect Yourself and Your Business with Indemnification Understanding
Herb Stapleton's FBI Experience Proves to be Asset to Dinsmore's Corporate Team
Former FBI Executive and Cybersecurity Leader Herbert Stapleton Joins Dinsmore’s National Corporate Practice
No Password Required: Former Lead Attorney at U.S. Cyber Command, Cyber Law Strategist, and Appreciator of ‘Mad Men’ Hats
A Counterintuitive Approach to Winning Without Litigation: One-on-One with Haley Morrison
Lawyers Beware: There Could Be Serious Ethics Issues With The New AI Browsers
LathamTECH in Focus: Tech Deals: The Emerging Focus of FDI Regulators?
Fox on Podcasting: Harnessing the Power of Niche
Navigating Employee Integration in Mergers and Acquisitions: Lessons From Pretty Woman — Hiring to Firing Podcast
FCPA Compliance Report: Stay the Course: Ellen Lafferty on Navigating Anti-Corruption Compliance in 2025
Multijurisdictional Employers, P2: 2025 State-by-State Updates on Non-Compete/Non-Solicitation Agts
6 Takeaways | From Tension to Teamwork: Real Strategies for Legal Collaboration
Hsu Untied interview with David Cohen, General Counsel at Infinite Athlete
Hsu Untied interview with Brad Waugh, General Counsel at TP-Link
Compliance Tip of the Day – New FCPA Enforcement Memo – What Does it Mean?
Hsu Untied interview with D'Lonra Ellis, CLO of Oakland A's
Your Guide to Dealing with Subpoenas Effectively
Episode 371 -- DOJ's New Corporate Enforcement Program
Shout Outs and Rants: Episode 153, The CW 25 Edition
Regulatory Ramblings: Episode 68 - Why Geopolitical Risk Matters to Compliance and Legal Staff with Mark Nuttal and Chad Olsen
Internal investigations have become a relatively normal part of doing business, but that does not mean the fruits of those investigations are discoverable even if they have a “business purpose.” The U.S. Court of Appeals for...more
As we previously reported, the Magistrate Judge in In re: Capital One Customer Data Security Breach Litigation, found that a forensic report that Capital One had claimed was protected by the privilege and work product...more
Judge Davis of the BLS ordered Facebook to produce documents to Massachusetts Attorney General Maura Healey (AG). The AG obtained the order while investigating Facebook’s policies and protections related to user data. The...more
A May 26, 2020 order by U.S. Magistrate Judge John F. Anderson (E.D. Va.) that attorney work product protection did not preclude production of a forensic vendor's data breach investigation report to plaintiffs in the Capital...more
The United States District Court for the Eastern District of Virginia (Court) has held that a cyber-forensic investigation report was not protected by the attorney work product doctrine and ordered Capital One to produce it...more
While much of the corporate legal world has been focused on the effects of the COVID-19 pandemic, a little-noticed case working its way through the federal courts in Washington, D.C. threatens to whittle down the scope of...more
In order to provide an overview for busy in-house counsel and compliance professionals, we summarize below some of the most important international anti-corruption developments from the past month, with links to primary...more
While social media has become ubiquitous, attorneys are subject to particular restrictions online. During Ward and Smith’s 2017 In-House Counsel Seminar two attorneys reviewed some of the potential pitfalls in-house counsel...more
The Supreme Court of Washington recently held that the attorney-client privilege does not protect a corporation’s attorney’s communications with former employees of the corporation, even if the communications concern events...more
On June 9, 2016, a divided New York Court of Appeals in a much-anticipated ruling held that the attorney-client privilege can only be maintained for communications involving third parties in situations where litigation is...more
We’ve previously written about the distinctions between hacking credit and other financial data in comparison to hacking private information. (See Ashley Madison and Coming to “Terms” with Data Protection.) The issue of how...more
This chart is provided by Perkins Coie LLP’s Decentralized Virtual Currency industry practice group for informational purposes only and is not legal advice. This information is not intended to create, and receipt of it does...more
In the modern world, employees routinely receive work-related data on personal mobile devices, such as smartphones and tablets, and access personal data on work-owned devices. ...more
Today we use King Arthur’s Round Table as the entry into our topic. The Round Table is the famous table around which he and his Knights congregated. Its shape implies that everyone who sits there has equal status. Wace, who...more
Earlier this month, a federal judge in New Jersey held that a secretly recorded conversation between a former chief executive officer and his general counsel may be used by prosecutors as evidence against the former executive...more